SlideShare a Scribd company logo
1 of 4
Download to read offline
Arpita Mahajan Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 9( Version 1), September 2014, pp.56-59 
www.ijera.com 56 | P a g e 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node Density Arpita Mahajan¹, Naresh Purohit² 1Patel college of science and technology, Indore, Department of Electronics and Communication Engineering Ralamandal, Bypass Road, Indore Gpo, Indore – 452001 (M.P.) India (M Tech Student), 2Patel college of science and technology, Indore, Department of Electronics and Communication Engineering , Ralamandal, Bypass Road, Indore Gpo, Indore - 452001(M.P.) India (Assistance Professor ) ABSTRACT 
Mobile Ad Hoc Networks (MANET) is an important and challenging research area. The routing protocol should detect and maintain a good route between source and destination nodes in these dynamic networks. Many routing protocols have been proposed for mobile ad hoc networks, and none can be considered as the best under all conditions. This thesis work consist a systematic comparative evaluation of a new multipath routing protocol for MANETS. The new protocol, called Multipath Destination Sequenced Distance Vector (MDSDV) is based on the well known single path Destination Sequenced Distance Vector (DSDV) is compared with known protocol DSDV. This work containing evaluates the protocols on a range of MANETS with between 50, 75 and 100 nodes, which are static nodes. The protocol comparison metrics are Throughput and Residual Energy. 
I. INTRODUCTION 
Mobile Ad Hoc Networks (MANETs) have gained an increasing significance. Ad Hoc networking is needed in many applications such as military and battlefield operations, virtual classrooms or conference rooms, and rescue operations in natural disasters. These kinds of applications require a network regardless of any infrastructure, and this is the idea behind MANETs which can be considered as flexible networks and suitable for such applications. MANETs are typically characterized by high mobility and frequent link failures that result in low throughput and high end-to-end delay. The increasing use of MANETs for transferring multimedia applications such as voice, video and data, leads to the need to provide QoS support. In mobile networks, node mobility makes the network topology change frequently, which is rare in wired networks. Mobile networks have a high error rate, bandwidth limitations and power restrictions. Due to the impacts from transmission power, receiver sensitivity, noise, fading and interference, wireless link capacity continually varies. Wireless networks can be deployed quickly and easily, and users stay connected to the network while they are moving around. Also, they play an important role in both civilian and military fields. We have seen great developments in Wireless networks infrastructure, availability of wireless applications, and proliferation of Wireless devices everywhere such as laptops, PDAs, and cell phones. According to the deployment of network infrastructure, Wireless networks can be divided into two types [1]. The first type is Infrastructure-based 
wireless networks and the second are infrastructure- less mobile networks, commonly known as ad-hoc networks. Infrastructure networks are those networks with fixed and wired gateways. The bridges for this type of networks are known as base stations. A mobile node connects to the nearest base station which is within its communication radius. As the mobile travels out of range of one base station and into the range of another, a “handoff” occurs from the old base station to the new, and the mobile is able to continue communication seamlessly throughout the network. 
II. CHARECTERISTICS 
Compared to other wired or infrastructure-based wireless networks and according to [2], Mobile ad hoc networks have the following characteristics. 
 Dynamic topology all nodes of mobile ad hoc network are free to move causing network topology changes rapidly at unpredictable times. Links between nodes are expected to break much more frequently than with wired and infrastructure based wireless networks. 
 Self-organization: Due to the lack of infrastructure or central administration, nodes should be able to form themselves into a network. 
 Multi-hopping: In a mobile ad hoc network, nodes use a wireless channel to transmit data, and due to the limited number of a node’s neighbors, intermediate nodes are used to relay the packets. 
 Resource conservation: In mobile ad hoc networks, the nodes are limited in both energy 
RESEARCH ARTICLE OPEN ACCESS
Arpita Mahajan Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 9( Version 1), September 2014, pp.56-59 
www.ijera.com 57 | P a g e 
supply and processing power. Power conservation becomes a very important factor to be considered when designing a network. Therefore, optimizing all operations may minimize the energy consumption. 
 Limited security: Mobile ad hoc networks are more prone to security threats than wired networks or infrastructure-based wireless networks because of their unique characteristics. Each mobile node in an ad hoc network can function as a router or packet forwarder for other nodes, both legitimate users and malicious attackers can access the wireless channel, and there is no well place where access control mechanisms can be deployed. As a result, separating the inside of the network from the outside world becomes imprecise. 
 Scalability: In some applications (e.g., battlefield deployments), mobile ad hoc networks may grow up to several thousand nodes. Mobile ad hoc networks suffer from scalability problems in channel capacity, because channel capacities are very limited and maximum use of channel capacity can be reached faster. Due to the multihoping nature of mobile ad hoc networks, their scalability is related to the routing protocols they employ. 
III. MANET ROUTING PROTOCOL 
In mobile ad hoc networks, the topology changes frequently because of node mobility. Secondly packet losses may occur frequently because of the variable and unpredictable capacity of wireless links. Furthermore, the broadcast nature of the wireless medium introduces the hidden terminal and exposed terminal problems, mobile nodes have limited power, limited bandwidth resources and require effective routing schemes. 
IV. DSDV 
The Destination-Sequenced Distance-Vector Routing protocol (DSDV) described in [12] is a table-driven algorithm based on the classical Bellman-Ford routing mechanism [13]. The improvements made to the Bellman-Ford algorithm include freedom from loops in routing tables. Every mobile node in the network maintains a routing table in which all of the possible destinations within the network and the number of hops to each destination are recorded. Each entry is marked with a sequence number assigned by the destination node. The sequence numbers enable the mobile nodes to distinguish stale routes from new ones, thereby avoiding the formation of routing loops. Routing table updates are periodically transmitted throughout the network in order to maintain table consistency. To help alleviate the potentially large amount of network traffic that such updates can generate, route updates can employ two possible types of packets. The first is known as a full dump. This type of packet carries all available routing information and can require multiple network protocol data units (NPDUs). In DSDV, each mobile node advertises its routing table (e.g., by broadcasting its entries) to its current neighbors. The entries in the routing table may change dynamically over time, so the routing information should be advertised to ensure that every node can always locate every other mobile node. Additionally, each mobile node agrees to relay data packets to other nodes upon request. Before each advertisement of a new routing table, mobile node increases its sequence number by 2. DSDV takes care of topology changes by using a certain procedure which is based on two kinds of updating: time-driven updates, which are periodic transmissions of a node’s routing table, and event-driven updates which react to link failures. Nodes schedule the newly recorded routes for immediate advertisement to the current node’s neighbors. Routes with an improved metric are scheduled for advertisement at a time which depends on the average settling time for routes to the particular destination under consideration. 
V. MDSDV OVERVIEW 
Since MDSDV like DSDV is proactive, it has the same advantages as DSDV where it maintains an up-to-date view of the network, and every node has a readily available route to every destination node in the network. Nodes in MDSDV periodically broadcast Hello Messages or Available Messages (depending on the Neighbors Table (NT)). If the node’s NT is empty, the node broadcasts a Hello Message; otherwise it broadcasts an Available Message. If a new node is detected, it will receive copies of the routing tables of all its neighbors (Full Dumps), and perform a filtering operation to initialize its own routing table. After creating its routing table, the new node broadcasts Update Packets (the number of Update Packets depends on the number of neighbors) to inform nodes of network topology changes. Failing transmissions cause the transmitter to report the link as a failure in an Error Packet which it propagates to all nodes using that link, When an intermediate node fails to forward a data packet, it unicast a Failure Packet to the source node to stop using the link included in the Failure Packet. 
VI. MDSDV TABLES 
Using MDSDV, each node maintains two tables: a Neighbors Table (NT) and a Routing Table (RT) which are described below: 
 Neighbors Table (NT): each node in the network maintains a Neighbors Table which
Arpita Mahajan Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 9( Version 1), September 2014, pp.56-59 
www.ijera.com 58 | P a g e 
contains all its neighbors. A node periodically checks its NT to decide whether to broadcast a Hello Message or an Available Message. If this table is empty, the node considers itself as an isolated node which means that it has to propagate a Hello Message (the node will be considered as a new node). Otherwise, it broadcasts an Available Message. Also, this table is used when the new node needs to initiate Update Packets. The NT is updated when the node receives a control packet from a neighbor or when one of its neighbors goes out of its transmission range. Table shows the structure of Neighbors Table entry. 
 Routing Table (RT): each node maintains its routing table that lists a number of paths for each destination in the network. The routing table is used to transmit packets through the network. Nodes have to update their routing tables when there is a significant change in the network. The Timeout field is only used for adjacent nodes, i.e., nodes that are within wireless transmission range. For all other nodes it is simply set to Null. Table shows the structure of a routing table entry. 
I. IMPLEMENTATION & RESULTS 
In this work have implemented work i.e. Creation of MANET Scenario for NS-2 and then to create Different routing protocols with the use of various performance matrices Like Residual energy and Throughput. In this work firstly created scenario file for IEEE 802.11 standard which has to be used along with TCL Script than created a TCL script consist of various routing protocols in this case these are DSDV and MDSDV than a particular MANET scenario or topology in our case it consist of 50, 75 and 100 static nodes with 30sec simulation time. Simulation Parameter:- 
II. EVOLUTION OF RESULTS 
This work to be done successfully have used MANET scenario with varying node density which are 50, 75 and 100 nodes and constant 30 sec under static scenario using various routing protocols and reached to the results with the help of various performance matrices for now we have used following performance matrices. 1. Residual Energy 2. Throughput 
III. RESIDUAL ENERGY 
It is the total amount of energy Consumed by the Nodes during the completion of Communication or simulation. 
Figure 1:- Residual Energy for DSDV and MDSD 
IV. THROUGHPUT 
There are two representations of throughput; one is the amount of data transferred over the period of time expressed in kilobits per second (Kbps). The other is the packet delivery percentage obtained from a ratio of the number of data packets sent and the number of data packets received. 
Figure2:- Overall Throughput for DSDV and MDSDV 
V. CONCLUSION 
In this work we analyzed all parameter which are Packet Delivery Ratio, End to End Delay, Routing Overhead, Overall Throughput Residual Energy and concluded that the MDSDV routing protocol is good as compare to the DSDV routing protocol for different node density which are 50 nodes, 75 nodes and 100 nodes with 30 sec simulation time for TCP traffic in IEEE 802.11 scenario with two ray ground propagation for Omni directional antenna. 
Simulation Tool 
NS-2.35 
IEEE Scenario 
802.11 
Propagation 
Two Ray Ground 
Number of nodes 
50, 75, 100 nodes 
Traffic Type 
TCP 
Antenna 
Omni directional antenna 
MAC Type 
IEEE 802.11 
Routing Protocol 
DSDV, MDSDV 
Queue limit 
50 Packets 
Simulation area (in metre) 
2 KM 
Queue type 
Droptail 
Channel 
Wireless Channel 
Simulation time 
30 sec.
Arpita Mahajan Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 9( Version 1), September 2014, pp.56-59 
www.ijera.com 59 | P a g e 
REFRENCES [1] C. Perkins, E. Belding-Royer, and S. Das. (July 2003). Ad hoc on-demand distance vector (AODV) routing. [2] C.E. Perkins and E.M. Royer. (February 1999). Ad-hoc on-demand distance vector routing. In proceedings of 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’99), (pp. pages 90–100). New Orleans, LA, United states. [3] D.B. Johnson, D.A. Maltz, J. Broch, et al. ( 2001). DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks. Ad hoc networking, 5, (pp. 139– 172). [4] ID Chakeres and EM Belding-Royer. (March 2004). AODV routing protocol implementation design. In Proceedings of 24th International Conference on Distributed Computing Systems Workshops, (pp. pages 698–703). Hachioji, Japan. [5] J. Tsai and T. Moors. (July 2006). A review of multipath routing protocols: from wireless ad hoc to mesh networks. In Proceedings of ACoRN Early Career Researcher Workshop on Wireless Multihop Networking, (pp. pages 17–18). Australia. [6] M. Abolhasan, T. Wysocki, and E. Dutkiewicz. (2004). A review of routing protocols for mobile ad hoc networks. . Ad Hoc Networks, 2(1), pp. 1–22. [7] M. Khazaei and R. Berangi. . ( October 2009). A multi-path routing protocol with fault tolerance in mobile ad hoc networks. In Proceedings of the 14th International CSI Computer Conference (CSICC 2009), (pp. pages 77–82). Tehran, Iran. [8] S.J. Lee and M. Gerla. (September 2000). AODV-BR: Backup routing in ad hoc networks. In Proceedings of IEEE Wireless Communications and Networking Conference (WCNC 2000), volume 3, pp. pages 1311–1316. Chicago, IL, USA. [9] T. Liu and K. Liu. (September 2007). Improvements on DSDV in mobile ad hoc networks. (pp. page 1637–1640). Shanghai, China: In Proceedings of International Conference on Wireless Communications, Networking and Mobile Computing (WiCom 2007). [10] T. Wan, E. Kranakis, and P.C. van Oorschot. (October 2004). Securing the Destination- Sequenced Distance Vector Routing Protocol (S-DSDV). In Proceedings of the 6th International Conference on Information and Communications Security (ICICS04), volume 3269, pp. pages 358–374. Malaga, Spain. 
[11] M. Khazaei and R. Berangi. A multi-path routing protocol with fault tolerance in mobile ad hoc networks. In Proceedings of the 14th International CSI Computer Conference (CSICC 2009), pages 77–82, Tehran, Iran, October 2009. [12] S.J. Lee and M. Gerla. AODV-BR: Backup routing in ad hoc networks. In Proceedings of IEEE Wireless Communications and Networking Conference (WCNC 2000), volume 3, pages 1311–1316, Chicago, IL, USA, September 2000.

More Related Content

What's hot

Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Vivek Maurya
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network YunusKhan38
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUVinish Alikkal
 
Investigating VANET for Unwavering Ways with Flawless Connectivity
Investigating VANET for Unwavering Ways with Flawless ConnectivityInvestigating VANET for Unwavering Ways with Flawless Connectivity
Investigating VANET for Unwavering Ways with Flawless Connectivitypaperpublications3
 
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...IRJET Journal
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsprjpublications
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologiesshashi712
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkIJNSA Journal
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSPallepati Vasavi
 

What's hot (20)

Secure routing Adhoc Networks
Secure routing Adhoc NetworksSecure routing Adhoc Networks
Secure routing Adhoc Networks
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
 
Unit 7
Unit 7Unit 7
Unit 7
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Investigating VANET for Unwavering Ways with Flawless Connectivity
Investigating VANET for Unwavering Ways with Flawless ConnectivityInvestigating VANET for Unwavering Ways with Flawless Connectivity
Investigating VANET for Unwavering Ways with Flawless Connectivity
 
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...
 
E1073644
E1073644E1073644
E1073644
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocols
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologies
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
CHAPTER-1234
CHAPTER-1234CHAPTER-1234
CHAPTER-1234
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
 

Viewers also liked

Apresentação - "Um Jogo para o Ensino de Programação Baseado na Taxonomia de ...
Apresentação - "Um Jogo para o Ensino de Programação Baseado na Taxonomia de ...Apresentação - "Um Jogo para o Ensino de Programação Baseado na Taxonomia de ...
Apresentação - "Um Jogo para o Ensino de Programação Baseado na Taxonomia de ...Sinval Vieira
 
Exceed Expectations 2013
Exceed Expectations 2013Exceed Expectations 2013
Exceed Expectations 2013Jochen Krisch
 
The heart of anatolia (muş)
The heart of anatolia (muş)The heart of anatolia (muş)
The heart of anatolia (muş)İbrahim DAL
 
Cuerpo y mente una polémica contemporánea en la cibercultura
Cuerpo y mente una polémica contemporánea en la ciberculturaCuerpo y mente una polémica contemporánea en la cibercultura
Cuerpo y mente una polémica contemporánea en la ciberculturaMaría Eugenia Gallo Arbeláez
 
φώτα τη νύχτα άννα φρ.
φώτα τη νύχτα   άννα φρ.φώτα τη νύχτα   άννα φρ.
φώτα τη νύχτα άννα φρ.GIA VER
 
Technologies, Strategies And Algorithm In Green Computing – Solution To Energ...
Technologies, Strategies And Algorithm In Green Computing – Solution To Energ...Technologies, Strategies And Algorithm In Green Computing – Solution To Energ...
Technologies, Strategies And Algorithm In Green Computing – Solution To Energ...IJERA Editor
 
Contaminacion bombillas grupo 6
Contaminacion bombillas grupo 6Contaminacion bombillas grupo 6
Contaminacion bombillas grupo 6Jose Indraya
 
Como montar um computador
Como montar um computadorComo montar um computador
Como montar um computadorjoaopriostexx
 
Apresentação English in Dublin / Inglês em Dublin
Apresentação English in Dublin / Inglês em DublinApresentação English in Dublin / Inglês em Dublin
Apresentação English in Dublin / Inglês em DublinAnderson Palma
 
8 manual cerca eletrica-intelbras-elc2002dm
8 manual cerca eletrica-intelbras-elc2002dm8 manual cerca eletrica-intelbras-elc2002dm
8 manual cerca eletrica-intelbras-elc2002dmMiguel Eletricista
 
3.1.1 rambu rambu penyusunan rpp tematik
3.1.1 rambu rambu penyusunan rpp tematik3.1.1 rambu rambu penyusunan rpp tematik
3.1.1 rambu rambu penyusunan rpp tematikOmay Widyana
 

Viewers also liked (20)

Apresentação - "Um Jogo para o Ensino de Programação Baseado na Taxonomia de ...
Apresentação - "Um Jogo para o Ensino de Programação Baseado na Taxonomia de ...Apresentação - "Um Jogo para o Ensino de Programação Baseado na Taxonomia de ...
Apresentação - "Um Jogo para o Ensino de Programação Baseado na Taxonomia de ...
 
3
33
3
 
Exceed Expectations 2013
Exceed Expectations 2013Exceed Expectations 2013
Exceed Expectations 2013
 
7
77
7
 
Qué es relata ( antes renata)
Qué es relata ( antes renata)Qué es relata ( antes renata)
Qué es relata ( antes renata)
 
Magic Landscapes
Magic LandscapesMagic Landscapes
Magic Landscapes
 
The heart of anatolia (muş)
The heart of anatolia (muş)The heart of anatolia (muş)
The heart of anatolia (muş)
 
Cuerpo y mente una polémica contemporánea en la cibercultura
Cuerpo y mente una polémica contemporánea en la ciberculturaCuerpo y mente una polémica contemporánea en la cibercultura
Cuerpo y mente una polémica contemporánea en la cibercultura
 
φώτα τη νύχτα άννα φρ.
φώτα τη νύχτα   άννα φρ.φώτα τη νύχτα   άννα φρ.
φώτα τη νύχτα άννα φρ.
 
Technologies, Strategies And Algorithm In Green Computing – Solution To Energ...
Technologies, Strategies And Algorithm In Green Computing – Solution To Energ...Technologies, Strategies And Algorithm In Green Computing – Solution To Energ...
Technologies, Strategies And Algorithm In Green Computing – Solution To Energ...
 
Contaminacion bombillas grupo 6
Contaminacion bombillas grupo 6Contaminacion bombillas grupo 6
Contaminacion bombillas grupo 6
 
Como montar um computador
Como montar um computadorComo montar um computador
Como montar um computador
 
Apresentação English in Dublin / Inglês em Dublin
Apresentação English in Dublin / Inglês em DublinApresentação English in Dublin / Inglês em Dublin
Apresentação English in Dublin / Inglês em Dublin
 
1
11
1
 
4 140925152050-phpapp01
4 140925152050-phpapp014 140925152050-phpapp01
4 140925152050-phpapp01
 
2
22
2
 
Palmitos Park 2016 Primer Ciclo
Palmitos Park 2016 Primer CicloPalmitos Park 2016 Primer Ciclo
Palmitos Park 2016 Primer Ciclo
 
arq pc
arq pcarq pc
arq pc
 
8 manual cerca eletrica-intelbras-elc2002dm
8 manual cerca eletrica-intelbras-elc2002dm8 manual cerca eletrica-intelbras-elc2002dm
8 manual cerca eletrica-intelbras-elc2002dm
 
3.1.1 rambu rambu penyusunan rpp tematik
3.1.1 rambu rambu penyusunan rpp tematik3.1.1 rambu rambu penyusunan rpp tematik
3.1.1 rambu rambu penyusunan rpp tematik
 

Similar to Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node Density

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETIOSR Journals
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETIOSR Journals
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocolsshashi712
 
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc NetworksOptimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc Networksijasuc
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
A Background Study Of MANET
A Background Study Of MANETA Background Study Of MANET
A Background Study Of MANETAngela Shin
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkSanjeev Kumar Jaiswal
 
Analysis of Multicast Routing Protocols: Puma and Odmrp
Analysis of Multicast Routing Protocols: Puma and OdmrpAnalysis of Multicast Routing Protocols: Puma and Odmrp
Analysis of Multicast Routing Protocols: Puma and OdmrpIJMER
 

Similar to Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node Density (20)

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc NetworksOptimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
Optimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
A Background Study Of MANET
A Background Study Of MANETA Background Study Of MANET
A Background Study Of MANET
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
 
eaodv
eaodveaodv
eaodv
 
Analysis of Multicast Routing Protocols: Puma and Odmrp
Analysis of Multicast Routing Protocols: Puma and OdmrpAnalysis of Multicast Routing Protocols: Puma and Odmrp
Analysis of Multicast Routing Protocols: Puma and Odmrp
 

Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node Density

  • 1. Arpita Mahajan Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 9( Version 1), September 2014, pp.56-59 www.ijera.com 56 | P a g e Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node Density Arpita Mahajan¹, Naresh Purohit² 1Patel college of science and technology, Indore, Department of Electronics and Communication Engineering Ralamandal, Bypass Road, Indore Gpo, Indore – 452001 (M.P.) India (M Tech Student), 2Patel college of science and technology, Indore, Department of Electronics and Communication Engineering , Ralamandal, Bypass Road, Indore Gpo, Indore - 452001(M.P.) India (Assistance Professor ) ABSTRACT Mobile Ad Hoc Networks (MANET) is an important and challenging research area. The routing protocol should detect and maintain a good route between source and destination nodes in these dynamic networks. Many routing protocols have been proposed for mobile ad hoc networks, and none can be considered as the best under all conditions. This thesis work consist a systematic comparative evaluation of a new multipath routing protocol for MANETS. The new protocol, called Multipath Destination Sequenced Distance Vector (MDSDV) is based on the well known single path Destination Sequenced Distance Vector (DSDV) is compared with known protocol DSDV. This work containing evaluates the protocols on a range of MANETS with between 50, 75 and 100 nodes, which are static nodes. The protocol comparison metrics are Throughput and Residual Energy. I. INTRODUCTION Mobile Ad Hoc Networks (MANETs) have gained an increasing significance. Ad Hoc networking is needed in many applications such as military and battlefield operations, virtual classrooms or conference rooms, and rescue operations in natural disasters. These kinds of applications require a network regardless of any infrastructure, and this is the idea behind MANETs which can be considered as flexible networks and suitable for such applications. MANETs are typically characterized by high mobility and frequent link failures that result in low throughput and high end-to-end delay. The increasing use of MANETs for transferring multimedia applications such as voice, video and data, leads to the need to provide QoS support. In mobile networks, node mobility makes the network topology change frequently, which is rare in wired networks. Mobile networks have a high error rate, bandwidth limitations and power restrictions. Due to the impacts from transmission power, receiver sensitivity, noise, fading and interference, wireless link capacity continually varies. Wireless networks can be deployed quickly and easily, and users stay connected to the network while they are moving around. Also, they play an important role in both civilian and military fields. We have seen great developments in Wireless networks infrastructure, availability of wireless applications, and proliferation of Wireless devices everywhere such as laptops, PDAs, and cell phones. According to the deployment of network infrastructure, Wireless networks can be divided into two types [1]. The first type is Infrastructure-based wireless networks and the second are infrastructure- less mobile networks, commonly known as ad-hoc networks. Infrastructure networks are those networks with fixed and wired gateways. The bridges for this type of networks are known as base stations. A mobile node connects to the nearest base station which is within its communication radius. As the mobile travels out of range of one base station and into the range of another, a “handoff” occurs from the old base station to the new, and the mobile is able to continue communication seamlessly throughout the network. II. CHARECTERISTICS Compared to other wired or infrastructure-based wireless networks and according to [2], Mobile ad hoc networks have the following characteristics.  Dynamic topology all nodes of mobile ad hoc network are free to move causing network topology changes rapidly at unpredictable times. Links between nodes are expected to break much more frequently than with wired and infrastructure based wireless networks.  Self-organization: Due to the lack of infrastructure or central administration, nodes should be able to form themselves into a network.  Multi-hopping: In a mobile ad hoc network, nodes use a wireless channel to transmit data, and due to the limited number of a node’s neighbors, intermediate nodes are used to relay the packets.  Resource conservation: In mobile ad hoc networks, the nodes are limited in both energy RESEARCH ARTICLE OPEN ACCESS
  • 2. Arpita Mahajan Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 9( Version 1), September 2014, pp.56-59 www.ijera.com 57 | P a g e supply and processing power. Power conservation becomes a very important factor to be considered when designing a network. Therefore, optimizing all operations may minimize the energy consumption.  Limited security: Mobile ad hoc networks are more prone to security threats than wired networks or infrastructure-based wireless networks because of their unique characteristics. Each mobile node in an ad hoc network can function as a router or packet forwarder for other nodes, both legitimate users and malicious attackers can access the wireless channel, and there is no well place where access control mechanisms can be deployed. As a result, separating the inside of the network from the outside world becomes imprecise.  Scalability: In some applications (e.g., battlefield deployments), mobile ad hoc networks may grow up to several thousand nodes. Mobile ad hoc networks suffer from scalability problems in channel capacity, because channel capacities are very limited and maximum use of channel capacity can be reached faster. Due to the multihoping nature of mobile ad hoc networks, their scalability is related to the routing protocols they employ. III. MANET ROUTING PROTOCOL In mobile ad hoc networks, the topology changes frequently because of node mobility. Secondly packet losses may occur frequently because of the variable and unpredictable capacity of wireless links. Furthermore, the broadcast nature of the wireless medium introduces the hidden terminal and exposed terminal problems, mobile nodes have limited power, limited bandwidth resources and require effective routing schemes. IV. DSDV The Destination-Sequenced Distance-Vector Routing protocol (DSDV) described in [12] is a table-driven algorithm based on the classical Bellman-Ford routing mechanism [13]. The improvements made to the Bellman-Ford algorithm include freedom from loops in routing tables. Every mobile node in the network maintains a routing table in which all of the possible destinations within the network and the number of hops to each destination are recorded. Each entry is marked with a sequence number assigned by the destination node. The sequence numbers enable the mobile nodes to distinguish stale routes from new ones, thereby avoiding the formation of routing loops. Routing table updates are periodically transmitted throughout the network in order to maintain table consistency. To help alleviate the potentially large amount of network traffic that such updates can generate, route updates can employ two possible types of packets. The first is known as a full dump. This type of packet carries all available routing information and can require multiple network protocol data units (NPDUs). In DSDV, each mobile node advertises its routing table (e.g., by broadcasting its entries) to its current neighbors. The entries in the routing table may change dynamically over time, so the routing information should be advertised to ensure that every node can always locate every other mobile node. Additionally, each mobile node agrees to relay data packets to other nodes upon request. Before each advertisement of a new routing table, mobile node increases its sequence number by 2. DSDV takes care of topology changes by using a certain procedure which is based on two kinds of updating: time-driven updates, which are periodic transmissions of a node’s routing table, and event-driven updates which react to link failures. Nodes schedule the newly recorded routes for immediate advertisement to the current node’s neighbors. Routes with an improved metric are scheduled for advertisement at a time which depends on the average settling time for routes to the particular destination under consideration. V. MDSDV OVERVIEW Since MDSDV like DSDV is proactive, it has the same advantages as DSDV where it maintains an up-to-date view of the network, and every node has a readily available route to every destination node in the network. Nodes in MDSDV periodically broadcast Hello Messages or Available Messages (depending on the Neighbors Table (NT)). If the node’s NT is empty, the node broadcasts a Hello Message; otherwise it broadcasts an Available Message. If a new node is detected, it will receive copies of the routing tables of all its neighbors (Full Dumps), and perform a filtering operation to initialize its own routing table. After creating its routing table, the new node broadcasts Update Packets (the number of Update Packets depends on the number of neighbors) to inform nodes of network topology changes. Failing transmissions cause the transmitter to report the link as a failure in an Error Packet which it propagates to all nodes using that link, When an intermediate node fails to forward a data packet, it unicast a Failure Packet to the source node to stop using the link included in the Failure Packet. VI. MDSDV TABLES Using MDSDV, each node maintains two tables: a Neighbors Table (NT) and a Routing Table (RT) which are described below:  Neighbors Table (NT): each node in the network maintains a Neighbors Table which
  • 3. Arpita Mahajan Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 9( Version 1), September 2014, pp.56-59 www.ijera.com 58 | P a g e contains all its neighbors. A node periodically checks its NT to decide whether to broadcast a Hello Message or an Available Message. If this table is empty, the node considers itself as an isolated node which means that it has to propagate a Hello Message (the node will be considered as a new node). Otherwise, it broadcasts an Available Message. Also, this table is used when the new node needs to initiate Update Packets. The NT is updated when the node receives a control packet from a neighbor or when one of its neighbors goes out of its transmission range. Table shows the structure of Neighbors Table entry.  Routing Table (RT): each node maintains its routing table that lists a number of paths for each destination in the network. The routing table is used to transmit packets through the network. Nodes have to update their routing tables when there is a significant change in the network. The Timeout field is only used for adjacent nodes, i.e., nodes that are within wireless transmission range. For all other nodes it is simply set to Null. Table shows the structure of a routing table entry. I. IMPLEMENTATION & RESULTS In this work have implemented work i.e. Creation of MANET Scenario for NS-2 and then to create Different routing protocols with the use of various performance matrices Like Residual energy and Throughput. In this work firstly created scenario file for IEEE 802.11 standard which has to be used along with TCL Script than created a TCL script consist of various routing protocols in this case these are DSDV and MDSDV than a particular MANET scenario or topology in our case it consist of 50, 75 and 100 static nodes with 30sec simulation time. Simulation Parameter:- II. EVOLUTION OF RESULTS This work to be done successfully have used MANET scenario with varying node density which are 50, 75 and 100 nodes and constant 30 sec under static scenario using various routing protocols and reached to the results with the help of various performance matrices for now we have used following performance matrices. 1. Residual Energy 2. Throughput III. RESIDUAL ENERGY It is the total amount of energy Consumed by the Nodes during the completion of Communication or simulation. Figure 1:- Residual Energy for DSDV and MDSD IV. THROUGHPUT There are two representations of throughput; one is the amount of data transferred over the period of time expressed in kilobits per second (Kbps). The other is the packet delivery percentage obtained from a ratio of the number of data packets sent and the number of data packets received. Figure2:- Overall Throughput for DSDV and MDSDV V. CONCLUSION In this work we analyzed all parameter which are Packet Delivery Ratio, End to End Delay, Routing Overhead, Overall Throughput Residual Energy and concluded that the MDSDV routing protocol is good as compare to the DSDV routing protocol for different node density which are 50 nodes, 75 nodes and 100 nodes with 30 sec simulation time for TCP traffic in IEEE 802.11 scenario with two ray ground propagation for Omni directional antenna. Simulation Tool NS-2.35 IEEE Scenario 802.11 Propagation Two Ray Ground Number of nodes 50, 75, 100 nodes Traffic Type TCP Antenna Omni directional antenna MAC Type IEEE 802.11 Routing Protocol DSDV, MDSDV Queue limit 50 Packets Simulation area (in metre) 2 KM Queue type Droptail Channel Wireless Channel Simulation time 30 sec.
  • 4. Arpita Mahajan Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 9( Version 1), September 2014, pp.56-59 www.ijera.com 59 | P a g e REFRENCES [1] C. Perkins, E. Belding-Royer, and S. Das. (July 2003). Ad hoc on-demand distance vector (AODV) routing. [2] C.E. Perkins and E.M. Royer. (February 1999). Ad-hoc on-demand distance vector routing. In proceedings of 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’99), (pp. pages 90–100). New Orleans, LA, United states. [3] D.B. Johnson, D.A. Maltz, J. Broch, et al. ( 2001). DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks. Ad hoc networking, 5, (pp. 139– 172). [4] ID Chakeres and EM Belding-Royer. (March 2004). AODV routing protocol implementation design. In Proceedings of 24th International Conference on Distributed Computing Systems Workshops, (pp. pages 698–703). Hachioji, Japan. [5] J. Tsai and T. Moors. (July 2006). A review of multipath routing protocols: from wireless ad hoc to mesh networks. In Proceedings of ACoRN Early Career Researcher Workshop on Wireless Multihop Networking, (pp. pages 17–18). Australia. [6] M. Abolhasan, T. Wysocki, and E. Dutkiewicz. (2004). A review of routing protocols for mobile ad hoc networks. . Ad Hoc Networks, 2(1), pp. 1–22. [7] M. Khazaei and R. Berangi. . ( October 2009). A multi-path routing protocol with fault tolerance in mobile ad hoc networks. In Proceedings of the 14th International CSI Computer Conference (CSICC 2009), (pp. pages 77–82). Tehran, Iran. [8] S.J. Lee and M. Gerla. (September 2000). AODV-BR: Backup routing in ad hoc networks. In Proceedings of IEEE Wireless Communications and Networking Conference (WCNC 2000), volume 3, pp. pages 1311–1316. Chicago, IL, USA. [9] T. Liu and K. Liu. (September 2007). Improvements on DSDV in mobile ad hoc networks. (pp. page 1637–1640). Shanghai, China: In Proceedings of International Conference on Wireless Communications, Networking and Mobile Computing (WiCom 2007). [10] T. Wan, E. Kranakis, and P.C. van Oorschot. (October 2004). Securing the Destination- Sequenced Distance Vector Routing Protocol (S-DSDV). In Proceedings of the 6th International Conference on Information and Communications Security (ICICS04), volume 3269, pp. pages 358–374. Malaga, Spain. [11] M. Khazaei and R. Berangi. A multi-path routing protocol with fault tolerance in mobile ad hoc networks. In Proceedings of the 14th International CSI Computer Conference (CSICC 2009), pages 77–82, Tehran, Iran, October 2009. [12] S.J. Lee and M. Gerla. AODV-BR: Backup routing in ad hoc networks. In Proceedings of IEEE Wireless Communications and Networking Conference (WCNC 2000), volume 3, pages 1311–1316, Chicago, IL, USA, September 2000.